โ† All skills
Tencent SkillHub ยท Security & Compliance

Update Signature Verifier

Helps verify the cryptographic integrity of skill updates by checking whether each version is signed by the same key as the original install, detecting key c...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Helps verify the cryptographic integrity of skill updates by checking whether each version is signed by the same key as the original install, detecting key c...

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.0.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 7 sections Open source page

Unsigned Updates Are the Trust Loophole Nobody Closes

Helps identify when skill updates break the cryptographic chain of custody established at install time โ€” catching the class of supply chain attacks that enters through legitimate update channels.

Problem

When you install a skill, you might verify the publisher's signature. When that skill updates two months later, does anyone check whether the update is signed by the same key? In most agent ecosystems, the answer is no. The install-time trust check doesn't extend to updates. A skill that was legitimately signed at installation can be silently transferred to a new publisher, updated from a compromised build pipeline, or modified without resigning โ€” and all of this is invisible unless someone explicitly traces the chain of custody across every version. This is not theoretical. Skills that accumulate users become valuable targets. The acquisition vector (buy the publisher account, gain access to the update channel) is simpler than compromising the skill directly. The trust you placed in version 1.0 doesn't automatically extend to version 1.4 if version 1.4 was signed by a different key.

What This Checks

This verifier examines update signature continuity across five dimensions: Key continuity โ€” Is each version signed by the same cryptographic key as the original installation? A key change between versions is a high-signal event that warrants explicit verification โ€” legitimate key rotations happen, but they should be announced Signature presence per version โ€” Does every published version carry a signature, or did signing start and stop across the version history? Gaps in signing coverage are a red flag even if the current version is signed Signing key provenance โ€” Is the signing key traceable to a publisher identity through a JWKS endpoint or key transparency log? Orphaned keys (present but unanchored) provide weaker trust anchoring than keys registered to verifiable identities Unsigned update detection โ€” Any version that was published without a signature but then followed by signed versions deserves scrutiny โ€” the unsigned version may be the one that was modified Chain-of-custody continuity โ€” Can you trace an unbroken line of signed updates from version 1.0 to the current version? A chain with gaps is fragile in the same way an attestation chain with broken links is fragile

How to Use

Input: Provide one of: A skill identifier with version history to audit A list of version-signing metadata (version, signing key fingerprint, signature timestamp) Two specific versions to compare chain-of-custody Output: A signature continuity report containing: Version-by-version signing key fingerprint comparison Key change events with timestamps Unsigned version detection Chain-of-custody completeness rating: CONTINUOUS / GAPS / BROKEN / UNSIGNED Recommended actions for each gap or anomaly

Example

Input: Verify signature chain for data-aggregator skill, versions 1.0.0 through 1.3.2 โœ๏ธ UPDATE SIGNATURE VERIFICATION Skill: data-aggregator Versions audited: 1.0.0 โ†’ 1.1.0 โ†’ 1.2.0 โ†’ 1.3.0 โ†’ 1.3.1 โ†’ 1.3.2 Audit timestamp: 2025-04-10T09:15:00Z Version signing summary: 1.0.0: โœ… Signed โ€” key: ed25519:a3f9c2 (publisher: original-dev) 1.1.0: โœ… Signed โ€” key: ed25519:a3f9c2 (same key, continuous) 1.2.0: โš ๏ธ UNSIGNED โ€” no signature field present 1.3.0: โœ… Signed โ€” key: ed25519:b7d441 (NEW KEY โ€” different from 1.1.0) 1.3.1: โœ… Signed โ€” key: ed25519:b7d441 (continuous from 1.3.0) 1.3.2: โœ… Signed โ€” key: ed25519:b7d441 (continuous) Key change detected: Between 1.1.0 and 1.3.0: ed25519:a3f9c2 โ†’ ed25519:b7d441 Coincides with: unsigned version 1.2.0 in the gap Key change announcement: Not found in publisher changelog New key provenance: ed25519:b7d441 not registered in JWKS endpoint Unsigned version: 1.2.0: Published 2025-02-14, no signature Content delta from 1.1.0: Dependency update + new outbound endpoint added Chain-of-custody: BROKEN Reasons: 1. Version 1.2.0 is unsigned 2. Key changed between 1.1.0 and 1.3.0 without announcement 3. Key change coincides with a version that added a new outbound endpoint 4. New signing key not registered in publisher's JWKS Risk assessment: HIGH The combination of an unsigned version introducing new network behavior, followed by a key rotation without announcement, matches the pattern of a compromised or transferred skill that was re-signed by a new controller. Recommended actions: 1. Request publisher explanation for key change at 1.2.0โ†’1.3.0 boundary 2. Audit the outbound endpoint added in 1.2.0 before trusting current version 3. Treat 1.3.x as signed by an unverified key until provenance is established 4. Consider pinning to 1.1.0 (last version with verified key) pending review

Related Tools

skill-update-delta-monitor โ€” Tracks behavioral changes in updates; update-signature-verifier checks whether updates are cryptographically authorized attestation-chain-auditor โ€” Validates the full trust chain; signing verifier focuses on the publisher-to-update link specifically publisher-identity-verifier โ€” Verifies publisher identity; signing verifier checks whether update authorship is consistent with that identity trust-decay-monitor โ€” Tracks trust freshness over time; signature gaps accelerate trust decay

Limitations

This verifier depends on the availability of per-version signing metadata, which many current skill marketplaces do not expose. Where version history lacks signing records, this tool can identify the absence of metadata but cannot reconstruct what signatures may have existed. Key change detection requires access to historical key fingerprints โ€” if a marketplace only stores the current signing key, pre-change versions cannot be compared. A continuous chain of valid signatures from the same key does not confirm the skill is safe โ€” a publisher whose key is compromised can issue malicious-but-validly-signed updates. Signing continuity establishes chain of custody, not trustworthiness of the content.

Category context

Identity, auth, scanning, governance, audit, and operational guardrails.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
1 Docs
  • SKILL.md Primary doc